Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Mathematics (16)
- Databases and Information Systems (13)
- Social and Behavioral Sciences (9)
- Graphics and Human Computer Interfaces (8)
- Artificial Intelligence and Robotics (7)
-
- Other Computer Sciences (7)
- Engineering (5)
- Theory and Algorithms (4)
- Computer Engineering (3)
- Psychology (3)
- Software Engineering (3)
- Arts and Humanities (2)
- Business (2)
- Chemistry (2)
- Earth Sciences (2)
- Education (2)
- Information Security (2)
- Library and Information Science (2)
- Life Sciences (2)
- Numerical Analysis and Scientific Computing (2)
- Statistics and Probability (2)
- Agriculture (1)
- Agronomy and Crop Sciences (1)
- Algebra (1)
- Applied Mathematics (1)
- Art and Design (1)
- Aviation (1)
- Aviation Safety and Security (1)
- Keyword
-
- Deception (4)
- Combinatorics (3)
- Claw-free graph (2)
- Conversational agents (2)
- Deception detection (2)
-
- Mathematics (2)
- Privacy (2)
- Security (2)
- Software engineering (2)
- AVATAR (1)
- Accessibility (1)
- Adaboost (1)
- Adversarial system (1)
- Agile information systems development (1)
- Agile software (1)
- Ai (1)
- Alamat Jual Obat Aborsi Jepang (1)
- Algebra (1)
- Algorithms (1)
- And Applications (1)
- Answer set programming (1)
- Artificial intelligence (1)
- Authentication (1)
- Automated Screening Kiosk (1)
- Automated Screening Systems (1)
- Automated deception detection (1)
- Automated detection of concealed information (1)
- Automated human credibility Screening (1)
- Automated screening systems (1)
- Automation (1)
- Publication
-
- Ryan Schuetzler (15)
- Zhi-Hong Chen (14)
- Yuliya Lierler (6)
- George K. Thiruvathukal (5)
- Saverio Perugini (4)
-
- Arun Kulkarni (2)
- Dr. David M Cook (2)
- Houbing Song (2)
- Alice Hall (1)
- Arnold R. Miller (1)
- Badri Adhikari (1)
- David Dampier (1)
- Eric A. Kowalik (1)
- J. Philip Craiger, Ph.D. (1)
- John E. Sawyer (1)
- Jual Obat Aborsi Tuntas - Obat Penggugur Kandungan (1)
- Karthikeyan Umapathy (1)
- Levente Juhasz (1)
- Maxwell Brickner (1)
- Patrick McNeil (1)
- Scott Hopes (1)
- Shayna Blum (1)
- Stephen E Henderson (1)
- William B. Andreopoulos (1)
- Wojciech Budzianowski (1)
- File Type
Articles 61 - 67 of 67
Full-Text Articles in Computer Sciences
Identification And Localization Of Tospovirus Genus-Wide Conserved Residues In 3d Models Of The Nucleocapsid And The Silencing Suppressor Proteins, Badri Adhikari, Cristian Olaya, Gaurav Raikhy, Jianlin Cheng, Hanu R. Pappu
Identification And Localization Of Tospovirus Genus-Wide Conserved Residues In 3d Models Of The Nucleocapsid And The Silencing Suppressor Proteins, Badri Adhikari, Cristian Olaya, Gaurav Raikhy, Jianlin Cheng, Hanu R. Pappu
Badri Adhikari
A Survey Of Software Metric Use In Research Software Development, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver
A Survey Of Software Metric Use In Research Software Development, Nasir U. Eisty, George K. Thiruvathukal, Jeffrey C. Carver
George K. Thiruvathukal
Background: Breakthroughs in research increasingly depend on complex software libraries, tools, and applications aimed at supporting specific science, engineering, business, or humanities disciplines. The complexity and criticality of this software motivate the need for ensuring quality and reliability. Software metrics are a key tool for assessing, measuring, and understanding software quality and reliability. Aims: The goal of this work is to better understand how research software developers use traditional software engineering concepts, like metrics, to support and evaluate both the software and the software development process. One key aspect of this goal is to identify how the set of metrics …
Cloud Resource Optimization For Processing Multiple Streams Of Visual Data, Zohar Kapach, Andrew Ulmer, Daniel Merrick, Arshad Alikhan, Yung-Hsiang Lu, Anup Mohan, Ahmed S. Kaseb, George K. Thiruvathukal
Cloud Resource Optimization For Processing Multiple Streams Of Visual Data, Zohar Kapach, Andrew Ulmer, Daniel Merrick, Arshad Alikhan, Yung-Hsiang Lu, Anup Mohan, Ahmed S. Kaseb, George K. Thiruvathukal
George K. Thiruvathukal
Hundreds of millions of network cameras have been installed throughout the world. Each is capable of providing a vast amount of real-time data. Analyzing the massive data generated by these cameras requires significant computational resources and the demands may vary over time. Cloud computing shows the most promise to provide the needed resources on demand. In this article, we investigate how to allocate cloud resources when analyzing real-time data streams from network cameras. A resource manager considers many factors that affect its decisions, including the types of analysis, the number of data streams, and the locations of the cameras. The …
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski
Call For Abstracts - Resrb 2019, July 8-9, Wrocław, Poland, Wojciech M. Budzianowski
Wojciech Budzianowski
No abstract provided.
Automatic Program Rewriting In Non-Ground Answer Set Programs, Nicholas Hippen, Yuliya Lierler
Automatic Program Rewriting In Non-Ground Answer Set Programs, Nicholas Hippen, Yuliya Lierler
Yuliya Lierler
Strong Equivalence And Program's Structure In Arguing Essential Equivalence Between First-Order Logic Programs, Yuliya Lierler
Strong Equivalence And Program's Structure In Arguing Essential Equivalence Between First-Order Logic Programs, Yuliya Lierler
Yuliya Lierler
Identification And Parasocial Relationships With Characters From Star Wars: The Force Awakens., Alice E. Hall